Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged secure-programming-practices
Home
Tag
secure-programming-practices
0
votes
Secure Programming Practices Interview Questions and Answers
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
secure-programming-techniques
spt-questions
0
votes
Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
algorithm-secure
encryption
secure-programming-practices
0
votes
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-program
secure-programming-practices
0
votes
On logout, how should an application deal with session cookies?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
session-cookies
application-cookies
security-cookies
secure-programming-practices
0
votes
To improve the overall quality of web applications, developers should abide by which of the following rules?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
web-application
web-security
secure-programming-practices
0
votes
From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
application-security
captcha-security
secure-programming-practices
0
votes
Which of the following is true about improper error handling?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
improper-error-handling
eror-handling
secure-programming-practices
0
votes
One of the main disadvantages of integrating cryptography into applications is:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
integrity-cryptography
security-application
secure-programming-practices
0
votes
Temporarily files created by applications can expose confidential data if:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
#temporarily-files
secure-programming-practices
confidential-data
security-data
0
votes
Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
Which of the following is a security advantage of managed code over unmanaged code?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-advantages
managed-code
secure-programming-practices
0
votes
Which of the following is not an authorization type?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
authorization-type
user-access
secure-programming-practices
0
votes
Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
sso-application
application-access
secure-programming-practices
0
votes
Which of the following is not recommended to secure web applications against authenticated users?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-programming-practices
web-applications
0
votes
Secure practices for access control include which of the following?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-practices
access-control
secure-programming-practices
0
votes
Identify the correct statement in the following:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
customer-trust
reputation-security
financial-security
compliance-security
secure-programming-practices
0
votes
Setting the cookie flag to which of the following mode is a good programming practice?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
cookie-flag
secure-programming-practices
good-programming-practice
0
votes
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
To see more, click for the
full list of questions
or
popular tags
.
...